Skip to main content

  Everything you put out on the internet, whether it is text messages, phone calls, emails, or web browsing, is being collected by the NSA.
    That much is proven. Only the amount of data that is being analyzed is up for debate.

  However, it doesn't stop there.

 photo Enemy_of_the_State_zps5bc60f48.jpg

Don't be evil

   Remember when the Google executive proclaimed that Google was "not in cahoots with NSA"?
   Boy they must have had quite the laugh at Google headquarters. It turns out that Google was in bed with the CIA instead.  The CIA and Google have a business partnership called Recorded Future.

 It’s not the very first time Google has done business with America’s spy agencies. Long before it reportedly enlisted the help of the National Security Agency to secure its networks, Google sold equipment to the secret signals-intelligence group. In-Q-Tel backed the mapping firm Keyhole, which was bought by Google in 2004 — and then became the backbone for Google Earth.
 Google has been working with our spy agencies for a very long time.
   One ex-CIA agent says that the CIA helped bankroll Google at its start. Is that true? It's hard to say, but what is known is that It doesn't sound like Google or Microsoft need to have their arms twisted.

  As for the NSA, it turns out that Google is doing far more than just letting the NSA peek at their servers.

 Google spokeswoman Gina Scigliano confirms that the company has already inserted some of the NSA’s programming in Android OS. “All Android code and contributors are publicly available for review at,” Scigliano says, declining to comment further....
    NSA officials say their code, known as Security Enhancements for Android, isolates apps to prevent hackers and marketers from gaining access to personal or corporate data stored on a device. Eventually all new phones, tablets, televisions, cars, and other devices that rely on Android will include NSA code, agency spokeswoman Vanee’ Vines said in an e-mailed statement.
 The code is to enhance security. Right. Because the NSA is all about helping people keep their secrets.

  The Android operating system is on 75% of all smart phones and tablets. Chances are you are already using one.

"Your privacy is our priority"

  Chances are if you use a computer at home or work then you use a Microsoft Windows machine.
Microsoft blazed a trail with corporate cooperation with the NSA.
   All the way back in 1999 people have known that Microsoft put a backdoor into their Windows operating system for the NSA.

  However, the extent of Microsoft's complicity was only revealed yesterday.

 Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.

The documents show that:

• Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new portal;

• The agency already had pre-encryption stage access to email on, including Hotmail;

 So if you are using a Microsoft product, whether it be Skype, Hotmail, or Windows, and you take every security measure to ensure your privacy, the NSA can still break your encryption.

  What these Microsoft and Google measures indicate is that the spying efforts go beyond just what you voluntarily send out on the internet. These are backdoors into your smart phone, tablet and home computer. If the NSA wants, and your phone or computer is turned on, they can check out the information on our hard drive whether you have encrypted it or not.
   The FBI wants a backdoor to ALL software.

   So then turn your phone off. That should be enough, right? Wrong.

 The FBI can listen to everything you say, even when the cell phone is turned off. A recent court ruling in a case against the Genovese crime family revealed that the FBI has the ability from a remote location to activate a cell phone and turn its microphone into a listening device that transmits to an FBI listening post, a method known as a "roving bug."  Experts say the only way to defeat it is to remove the cell phone battery.
 Government computer spying isn't just a passive thing. They have become very assertive, and that includes creating computer virus.
 Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear program in 2010 [i.e. the U.S. and Israel], according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections.
   Flame can gather data files, remotely change settings on computers, turn on PC microphones to record conversations, take screen shots and log instant messaging chats.
 That the government is actually developing computer virus is amazing. Not for who they design the virus for, but because virus spread in unexpected ways. There is virtually a 100% chance that innocent and unintended people are going to get infected.

  After all wars governments use the technology they developed for commercial purposes. Well, the cyberwar has just started.
   German police have already been caught using trojan virus to spy on people and take control of their webcams.
   Hackers have started doing the same thing.

  So you live in the stone age. No computer or cell phone? Then you are safe from spying, right? Wrong.

 Surreptitious activation of built-in microphones by the FBI has been done before. A 2003 lawsuit revealed that the FBI was able to surreptitiously turn on the built-in microphones in automotive systems like General Motors’ OnStar to snoop on passengers’ conversations.
 OK. So you don't have a modern car either. That should deter spying, right? Wrong.
 After signing up with the German smart-meter firm Discovergy, the researchers detected that the company's devices transmitted unencrypted data from the home devices back to the company's servers over an insecure link. The researchers, Dario Carluccio and Stephan Brinkhaus, intercepted the supposedly confidential and sensitive information, and, based on the fingerprint of power usage, were able to tell not only whether or not the homeowners were home, away or even sleeping, but also what movie they were watching on TV.
 A really detaled smart meter can see what TV shows you watch and scan for copywrite protection on your DVDs. Smart meter energy usage is used to bust pot growers. Insurance companies could use the information from a smart meter to determine dietary and obesity trends or uses of a specific medical device.

 It doesn't stop there. Private security cameras can be accessed


  Why do these big technology companies help the government's spying efforts?
Many people like to imply that they are being forced to cooperate with an obtrusive government, but they are kidding themselves.

  Big companies have financial reasons to cooperate with the government's spying.
Wall Street banks spied on Occupy protestors with tax-funded monitoring centers. Plans for the center were created years before the protests.
   It is estimated that 23,000 representatives of private industry are working with Homeland Security and the FBI to collect information on other Americans.

 In return, members of this rapidly growing group, called InfraGard, receive secret warnings of terrorist threats before the public, and at times before elected officials. “There is evidence that InfraGard may be closer to a corporate Total Information Awareness program (TIPS), turning private-sector corporations—some of which may be in a position to observe the activities of millions of individual customers—into surrogate eyes and ears for the FBI,” according to an ACLU report titled “The Surveillance-Industrial Complex: How the American Government Is Conscripting Businesses and Individuals in the Construction of a Surveillance Society.”
 So called "Fusion Centers" have been set up all over the country, run by the DoJ and Homeland Security.
Participation in fusion centers might give Boeing access to the trade secrets or security vulnerabilities of competing companies, or might give it an advantage in competing for government contracts. Expecting a Boeing analyst to distinguish between information that represents a security risk to Boeing and information that represents a business risk may be too much to ask.
And that is a clue as to why corporations are tripping over each other to help out our spy agencies.
   There is evidence of CIA and executive branch officials acting on information about top-secret authorization of coups to front-run markets.

  Selling insider information 5 minutes before the general market gets it can make someone a lot of money. A lot of money.
  This includes things like Federal Reserve minutes.

"At this time, we do not know whether there was any trading related to inadvertent early distribution of the minutes," a Fed spokesman said.
  More than 100 people, primarily congressional staffers and employees of trade associations, had received the minutes of the Fed's March policy meeting around 2 p.m. on Tuesday -- about 24 hours before their scheduled public release.
   The minutes, which suggested policymakers were nearing a decision on tapering their bond purchases, pushed prices for U.S. government debt lower and helped lift the dollar to a four-year high against the yen after they were released broadly Wednesday morning.
 The most obvious case of someone using insider information from an intelligence agency to front-run the markets was the infamous airline shorts made the afternoon before 9/11.
Sources tell CBS News that the afternoon before the attack, alarm bells were sounding over unusual trading in the U.S. stock options market.
   An extraordinary number of trades were betting that American Airlines stock price would fall.
The trades are called "puts" and they involved at least 450,000 shares of American. But what raised the red flag is more than 80 percent of the orders were "puts", far outnumbering "call" options, those betting the stock would rise.
   Sources say they have never seen that kind of imbalance before, reports CBS News Correspondent Sharyl Attkisson. Normally the numbers are fairly even.
   After the terrorist attacks, American Airline stock price did fall obviously by 39 percent, and according to sources, that translated into well over $5 million total profit for the person or persons who bet the stock would fall.
   At least one Wall Street firm reported their suspicions about this activity to the SEC shortly after the attack.
 This much is well known. No one ever came to collect on those short positions, so we'll never know for certain who placed them.
   What isn't as well known is the SEC response.
 This letter is in response to your request seeking access to and copies of the documentary evidence referred to in footnote 130 of Chapter 5 of the September 11 (9/11) Commission Report.
We have been advised that the potentially responsive records have been destroyed.
 I have long suspected that the SEC was the most incompetent agency in the government, but now I'm thinking it is by design.

  However, the most obvious way that corporations can benefit from the government is through police-enforced protection from protestors and activists.
   For instance, protesting against fracking can get you labelled a terrorist. So can distributing counterfeit DVDs and cigarettes. In fact the act of selling mixed CDs can bring in SWAT teams.
    Videotaping animal abuse at a factory farm is now considered a terrorist act.

9:00 PM PT: How much does it cost the taxpayer for the government to spy on you? A lot.

 AT&T, for example, imposes a $325 "activation fee" for each wiretap and $10 a day to maintain it. Smaller carriers Cricket and U.S. Cellular charge only about $250 per wiretap. But snoop on a Verizon customer? That costs the government $775 for the first month and $500 each month after that, according to industry disclosures made last year to Congressman Edward Markey.

Meanwhile, email records like those amassed by the National Security Agency through a program revealed by former NSA systems analyst Edward Snowden probably were collected for free or very cheaply. Facebook says it doesn't charge the government for access. And while Microsoft, Yahoo and Google won't say how much they charge, the American Civil Liberties Union found that email records can be turned over for as little as $25.

Originally posted to gjohnsit on Thu Jul 11, 2013 at 06:10 PM PDT.

Also republished by The First and The Fourth.

Your Email has been sent.
You must add at least one tag to this diary before publishing it.

Add keywords that describe this diary. Separate multiple keywords with commas.
Tagging tips - Search For Tags - Browse For Tags


More Tagging tips:

A tag is a way to search for this diary. If someone is searching for "Barack Obama," is this a diary they'd be trying to find?

Use a person's full name, without any title. Senator Obama may become President Obama, and Michelle Obama might run for office.

If your diary covers an election or elected official, use election tags, which are generally the state abbreviation followed by the office. CA-01 is the first district House seat. CA-Sen covers both senate races. NY-GOV covers the New York governor's race.

Tags do not compound: that is, "education reform" is a completely different tag from "education". A tag like "reform" alone is probably not meaningful.

Consider if one or more of these tags fits your diary: Civil Rights, Community, Congress, Culture, Economy, Education, Elections, Energy, Environment, Health Care, International, Labor, Law, Media, Meta, National Security, Science, Transportation, or White House. If your diary is specific to a state, consider adding the state (California, Texas, etc). Keep in mind, though, that there are many wonderful and important diaries that don't fit in any of these tags. Don't worry if yours doesn't.

You can add a private note to this diary when hotlisting it:
Are you sure you want to remove this diary from your hotlist?
Are you sure you want to remove your recommendation? You can only recommend a diary once, so you will not be able to re-recommend it afterwards.
Rescue this diary, and add a note:
Are you sure you want to remove this diary from Rescue?
Choose where to republish this diary. The diary will be added to the queue for that group. Publish it from the queue to make it appear.

You must be a member of a group to use this feature.

Add a quick update to your diary without changing the diary itself:
Are you sure you want to remove this diary?
(The diary will be removed from the site and returned to your drafts for further editing.)
(The diary will be removed.)
Are you sure you want to save these changes to the published diary?

Comment Preferences

schemp, SME in Seattle, felix19, bink, Alumbrados, shari, cslewis, Mimikatz, Mogolori, PhilK, melo, Timaeus, roonie, Liberal Thinking, native, misscee, mimi, PeterHug, wytcld, DebtorsPrison, Shockwave, wu ming, LynChi, Cvstos, genethefiend, hyperstation, LEP, RFK Lives, MarkInSanFran, expatjourno, hubcap, Gustogirl, kenm, TheMomCat, Justina, bronte17, Zinman, Babsnc, TracieLynn, Einsteinia, magnetics, whenwego, cosmic debris, taonow, recontext, psnyder, Dallasdoc, CitizenOfEarth, ranger995, bula, TiaRachel, jsquared, Bluehawk, riverlover, 313to212, Pohjola, zerelda, Deward Hastings, ScienceMom, Mosquito Pilot, xxdr zombiexx, sawgrass727, Tirge Caps, humphrey, 3goldens, greycat, unclejohn, ek hornbeck, corvo, Militarytracy, kamarvt, run around, Simplify, truong son traveler, david78209, YucatanMan, Laurence Lewis, Lepanto, reflectionsv37, eru, Sun Tzu, Jaime Frontero, ladybug53, Burned, Kayakbiker, Ozymandius, Sandino, Tool, LieparDestin, AnotherMassachusettsLiberal, WisePiper, MindRayge, Indiana Bob, CJnyc, Jim P, martini, Paul Ferguson, tarheelblue, Medium Head Boy, ActivistGuy, HoundDog, Gorette, Yellow Canary, koNko, mskitty, KenBee, The Wizard, kck, Lefty Coaster, blueoasis, Blue Wind, DarkestHour, triv33, MJ via Chicago, jguzman17, Rosaura, gooderservice, joe shikspack, NearlyNormal, sceptical observer, onionjim, midwesterner, profh, James Hepburn, Persiflage, Timothy J, Clive all hat no horse Rodeo, Dianna, Cassiodorus, shaharazade, kurious, markthshark, Aaa T Tudeattack, cpresley, ammasdarling, One Pissed Off Liberal, RWood, ColoTim, BruceMcF, karmsy, Wino, Mary Mike, CTDemoFarmer, some other george, terabytes, dclawyer06, suejazz, aliasalias, Kentucky Kid, HCKAD, jamesia, mudslide, SeaTurtle, bobswern, carpunder, madgranny, JML9999, homerun, on the cusp, JDWolverton, End game, CroneWit, also mom of 5, GAS, wayoutinthestix, zerone, poligirl, Youffraita, dadadata, elwior, FarEasterner, Lujane, bluesheep, codairem, petulans, 3rdOption, Notreadytobenice, priceman, Robobagpiper, palantir, protectspice, CIndyCasella, LaFeminista, Louisiana 1976, Rhysling, rubyclaire, J M F, greengemini, divineorder, nchristine, lostinamerica, RenMin, dharmasyd, Carol in San Antonio, CanyonWren, maryabein, Methinks They Lie, Nailbanger, shopkeeper, mkor7, JesseCW, fToRrEeEsSt, jmknapp53, petral, montecristo, Words In Action, coppercelt, flitedocnm, The Jester, The Free Agent, CcVenussPromise, sunny skies, gulfgal98, Puddytat, Kristina40, Jaimas, albrt, Funkygal, Johnny Q, Publius2008, Floande, Nada Lemming, pajoly, MidwestTreeHugger, Oldowan, stone clearing, poorbuster, Seitanist, FarWestGirl, lexalou, marleycat, thomask, Wolf10, muddy boots, voicemail, enhydra lutris, PhilJD, Eric Stetson, SteelerGrrl, GrannyGeek, dradams, jadt65, DRo, Auriandra, No one gets out alive, Azazello, OutcastsAndCastoffs, paulbkk, BlueDragon, RockyJ, Whimsical Rapscallion, DeadHead, Williston Barrett, greenbastard, Mindful Nature, dance you monster, Hemp Guy, 2thanks, FreeSpeaker, congenitalefty, Horace Boothroyd III, peachcreek, radical simplicity, wxorknot, AverageJoe42, George3, katiec, ottoveil, Robynhood too, WheninRome, BobTheHappyDinosaur, Rosedale, Chaddiwicker, JohnnyBoston, MrBigDaddy, goodpractice, Demeter Rising, moredamnpolitics, KatrinD, Stentorian Tone, DKBurton, bygorry, britzklieg

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site